Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
The U.S. Cybersecurity and Infrastructure Security Agency has begun issuing alerts about 56 flaws across operational technology equipment built by 10 different vendors. Researchers at Forescout Technologies say the flaws trace to poor design decisions by vendors.
Insurance claims being filed by ransomware victims are growing as criminals continue to hit businesses with crypto-locking malware. To avoid these claims, organizations can take a number of proven steps to better protect themselves, says Payal Chakravarty of Coalition.
Canada's Desjardins Group has reached an out-of-court settlement to resolve a data breach class action lawsuit. The breach, which the credit union group first disclosed in 2019, traced to a "malicious" insider who for 26 months had been selling personal details for 4.2 million active customers.
As shown by a recent survey conducted by the Information Security Media Group (ISMG) in conjunction with Palo Alto Networks and Accenture, patient care has never been more dependent on technology than it is today. We rely on technology to save lives, improve patient outcomes, expand quality and continuity of care,...
Three in four organizations experienced a malware attack last year, according to Comparitech. With malware attacks increasing year over year, it is imperative to arm your network with proactive solutions coinciding with reactive solutions. Take the first steps to protect your IT environment by equipping yourself with...
Defending your business against highly motivated and well-equipped threat actors requires a proactive approach beyond standard security controls. While seemingly daunting, modern tools automate many security tasks and support your human security experts with cleverly applied Artificial Intelligence applications. A...
Numerous new malware variants are discovered every day – the damage is enormous and, according to the Cybercrime Magazine it will cost the world 10.5 trillion dollars by 2025. The “human factor” plays an increasingly important role here—after all, 9 out of 10 cyberattacks start with humans.
Download the...
Attention to anyone who manages a Microsoft Windows environment: Security researchers are tracking a zero-day vulnerability in Microsoft Office that's being actively exploited by attackers to run malicious code on a vulnerable system.
Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol says. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
Since existing security products are not adaptable to the way applications are being developed and pushed today, continuous security testing proves an ideal solution that helps in staying ready for any threat that is coming your way.
Download this datasheet to learn:
Why you should continuously test and tune your...
Tenable has agreed to purchase startup Bit Discovery for $44.5 million to help companies discover, attribute and monitor assets on the internet. The deal will allow Tenable to identify vulnerable internet-facing assets that could be attacked.
Fresh warnings are being sounded about the threat posed by semi-autonomous killing machines both on and above the battlefield, especially as lethal weapons continue to gain features that push them toward full autonomy. Experts say international norms and legal safeguards are overdue.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.